cloud cybersecurity beyond saas

41
April 28, 2015 Cloud Cybersecurity Beyond SaaS Tsahy Shapsa Co-Founder Russell Miller Director of Product Marketing

Upload: cloudlock

Post on 19-Jan-2017

235 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Cloud Cybersecurity Beyond SaaS

April 28, 2015

Cloud Cybersecurity Beyond SaaS

Tsahy ShapsaCo-Founder

Russell MillerDirector of Product Marketing

Page 2: Cloud Cybersecurity Beyond SaaS

The Enterprise Cloud IT Backbone & Cloud Factory

Business Backbone People Factory (PaaS & IaaS)

Legacy Security SolutionsON

- P

RE

MIS

EC

LO

UD

CyberSecurity Fabric

Messaging & Collaboration

Sales & marketing

HR & Skills

Finance

Sharepoint

Apps

App Server

Database

force.com

CloudLock Confidential - DO NOT DISTRIBUTE 2

Page 3: Cloud Cybersecurity Beyond SaaS

Agenda

01

02

03

04

Cyberlab Research: The 1% Who Can Take Down Your Organization

The Anatomy of a Cloud Cyberattack

To Proxy or Not To Proxy

CloudLock Cybersecurity Fabric

3

05

Requirements for a Cloud Security Solution

Page 4: Cloud Cybersecurity Beyond SaaS

The 1% Who Can Take Down Your Organization

4

Page 5: Cloud Cybersecurity Beyond SaaS

Disproportionate Cloud Risk

5

Cyberlab

Page 6: Cloud Cybersecurity Beyond SaaS

Agenda

01

02

03

04

Cyberlab Research: The 1% Who Can Take Down Your Organization

The Anatomy of a Cloud Cyberattack

To Proxy or Not To Proxy

CloudLock Cybersecurity Fabric

6

05

Requirements for a Cloud Security Solution

Page 7: Cloud Cybersecurity Beyond SaaS

Anatomy of a pure cloud cyberattack

Deliver ActRecon

1 2 3

Page 8: Cloud Cybersecurity Beyond SaaS

Recon - Person / Location / Activity / Relevance

Page 9: Cloud Cybersecurity Beyond SaaS

Deliver - Pure Cloud Weapon - Delivery

Page 10: Cloud Cybersecurity Beyond SaaS

Deliver - Pure Cloud Weapon - Authorization

Page 11: Cloud Cybersecurity Beyond SaaS

Act - Cyberattack - Escalate / Impersonate / Exfiltrate

Page 12: Cloud Cybersecurity Beyond SaaS

Agenda

01

02

03

04

Cyberlab Research: The 1% Who Can Take Down Your Organization

The Anatomy of a Cloud Cyberattack

CloudLock Cybersecurity Fabric

12

05

Requirements for a Cloud Security Solution

To Proxy or Not To Proxy

Page 13: Cloud Cybersecurity Beyond SaaS

People Centric Approach to Cloud Cybersecurity

13

IDENTITY CLOUD

DEVICE

ACCOUNTS APPS

DATA

Page 14: Cloud Cybersecurity Beyond SaaS

ACCOUNTS APPS

DATA

Cloud Cybersecurity - Compromised Accounts

14

#1 Compromised Accounts

#2 Cloud Malware

#3 Data Breaches

#4 Compliance

#5 SecOps & Forensics

Page 15: Cloud Cybersecurity Beyond SaaS

15

To detect account compromises, look across platforms!

● Distance from the US to the Central African Republic: 7,362 miles● At a speed of 800 mph, it would take 9.2 hours to travel between

them

Page 16: Cloud Cybersecurity Beyond SaaS

ACCOUNTS APPS

DATA

Cloud Cybersecurity - Cloud Malware

16

#1 Compromised Accounts

#2 Cloud Malware

#3 Data Breaches

#4 Compliance

#5 SecOps & Forensics

Page 17: Cloud Cybersecurity Beyond SaaS

Cloud Cybersecurity - Cloud Malware

17

Multiple Users Amount & Type of Data & Appsx x3rd Party

OAuth App

Page 18: Cloud Cybersecurity Beyond SaaS

ACCOUNTS APPS

DATA

Cloud Cybersecurity - Data Breaches

18

#1 Compromised Accounts

#2 Cloud Malware

#3 Data Breaches

#4 Compliance

#5 SecOps & Forensics

Page 19: Cloud Cybersecurity Beyond SaaS

Data Breaches: Where is my sensitive data?..

SaaS

force.com

PaaS and IaaS

force.com

IDaaS

Page 20: Cloud Cybersecurity Beyond SaaS

ACCOUNTS APPS

DATA

Cloud Cybersecurity - Compliance

20

#1 Compromised Accounts

#2 Cloud Malware

#3 Data Breaches

#4 Compliance

#5 SecOps & Forensics

Page 21: Cloud Cybersecurity Beyond SaaS

Compliance: Responding to audit requests

SaaS

force.com

PaaS and IaaS

force.com

IDaaS

Page 22: Cloud Cybersecurity Beyond SaaS

ACCOUNTS APPS

DATA

Cloud Cybersecurity - SecOps & Forensics

22

#1 Compromised Accounts

#2 Cloud Malware

#3 Data Breaches

#4 Compliance

#5 SecOps & Forensics

Page 23: Cloud Cybersecurity Beyond SaaS

SecOps & Forensics

SaaS

force.com

PaaS and IaaS

force.com

IDaaS

EnterpriseEnterprise

Page 24: Cloud Cybersecurity Beyond SaaS

Agenda

01

02

03

04

Cyberlab Research: The 1% Who Can Take Down Your Organization

The Anatomy of a Cloud Cyberattack

CloudLock Cybersecurity Fabric

24

05

Requirements for a Cloud Security Solution

To Proxy or Not To Proxy

Page 25: Cloud Cybersecurity Beyond SaaS

Questions You Must Ask Yourself

SaaS

force.com

PaaS and IaaS

force.com

IDaaS

What do users do in my Cloud Apps?

How do I identify compromised Accounts?

What Shadow Apps are my users using?

Are Shadow Apps connected to sanctioned Ones ?

Do I have sensitive Toxic/regulated data in the cloud?

How do I encrypt/ Quarantine sensitive data in the cloud?

Page 26: Cloud Cybersecurity Beyond SaaS

SaaS

force.com

PaaS and IaaS

force.com

IDaaS

To Proxy or Not To Proxy...

26

Proxy Hybrid API

Page 27: Cloud Cybersecurity Beyond SaaS

“ I fear not the man who has

practiced 10,000 kicks once, but I

fear the man who has practiced

one kick 10,000 times.”

Focus is Success

Page 28: Cloud Cybersecurity Beyond SaaS

Agenda

01

02

03

04

Cyberlab Research: The 1% Who Can Take Down Your Organization

The Anatomy of a Cloud Cyberattack

CloudLock Cybersecurity Fabric

28

05

Requirements for a Cloud Security Solution

To Proxy or Not To Proxy

Page 29: Cloud Cybersecurity Beyond SaaS

Enterprise

Cloud Cybersecurity Platform

App Developer

Homegrown Apps

ISV Cloud Apps

End - User 29CloudLock Confidential - DO NOT DISTRIBUTE

DLP / Content Classification

EncryptionManagement

AppsFirewall

Configuration Security

IT Security

User Behavior Analytics

. . .

Enterprise

SaaS

force.com

PaaS and IaaS IDaaS

Page 30: Cloud Cybersecurity Beyond SaaS

Cybersecurity is much more than just SaaS

Page 31: Cloud Cybersecurity Beyond SaaS

Case Study: PCI Compliance on AWS

● ACME Runs a Video Streaming Service on AWS

● Home-grown apps process CC info

● Recent Data Breaches sparked audit board toassess ‘PCI risk profile’

Company Profile

Business Requirements

● PCI Risk Assessment of data stored in S3● Establish on-going PCI compliance

enforcement controls on S3● Create a PCI Compliance reporting Readiness

for internal & external audit● ‘Everything-as-a-Service’ DNA

Page 32: Cloud Cybersecurity Beyond SaaS

Solution: PCI-Compliance-as-a-Service

Enterprise

■ POC - one day

■ Subscribe to CloudLock’s ‘Content

Classification’ API service

■ Minor modification to home-grownapp

Solution

CloudLock APIs

File / Object

Query:PCI Data?

10 ‘hits’ of PCI Data

Page 33: Cloud Cybersecurity Beyond SaaS

Next Step: Get a Cybersecurity Assessment

bit.ly/cloudlock-assessment

Page 34: Cloud Cybersecurity Beyond SaaS

Q&A Tsahy ShapsaCo-Founder

Russell MillerDirector of Product Marketing

Page 35: Cloud Cybersecurity Beyond SaaS

CloudLock Cybersecurity Report

CloudLock Cloud Cybersecurity Report: 1% Who Can Take Down Your Organization

Key Findings:

FREE DOWNLOAD

35

AppsTop 25 apps that connect to corporate accounts comprise 62% of all installs - each representing a digital inroad to your organization, yet there is a long tail of hundreds of apps with fewer installs but higher risk profiles

Collaboration75% of inter-organization collaboration is with 25 other organizations, despite an average of 865 collaborative organizations per company

UsersThe Top 1% of Users Create 75% of Cloud Cybersecurity Risk

Page 36: Cloud Cybersecurity Beyond SaaS

36

CloudLock: Proven Leader for Cloud Cybersecurity

91,000APPS

DISCOVERED

10 MillionUSERS FILES

MONITORED DAILY

1 Billion

Page 38: Cloud Cybersecurity Beyond SaaS

Q1 2015 Cloud Cybersecurity Report: The Extended Perimeter

38

Page 39: Cloud Cybersecurity Beyond SaaS

CloudLock’s DNA

Business

Investors

Trust

Value Prop

Approach

Founded in 2011, 135 Employees, global offices

Unified multi-cloud solution for Cloud Data Protection & Governance, Risk & Compliance, App

Discovery & Control, Auditing & Forensics, Threat Protection & User Behavior Analytics

SaaS: Cloud-Native and 100% API-based

No gateways, no proxies, no impact on workflows, users, or platform performance

Page 40: Cloud Cybersecurity Beyond SaaS

40

Cloud Security Fabric

Page 41: Cloud Cybersecurity Beyond SaaS

Inc. 500 (Aug. 2015)

41

3-year growth: 3,557%

Overall: No. 93

Security: No. 1 in U.S.

Technology: No 1 in Mass